ABSTRACT
How does a small higher education institution implement security controls to protect sensitive data and at the same time not make end users feel as if they are losing ownership of their computer? Whitman College grappled with this problem for several years and finally found a solution where we can (almost) have it all. Using existing technology and one additional vendor solution we are able to realize our goal of a secure computing environment while maintaining a flexible, friendly user environment.
Index Terms
- Security BYOD: Be Your Own Defense
Recommendations
CReST-Security Knitting Kit: Ready to Use Teaching Resources to Embed Security Topics into Upper Division CS Courses (Abstract Only)
SIGCSE '16: Proceedings of the 47th ACM Technical Symposium on Computing Science EducationInformation Assurance and Security has been designated as a new knowledge area in the new ACM/IEEE-CS Curricula 2013. This is not a trivial task to accomplish, especially with lack of resources. With support from NSF (Award# DUE-1140864), we have ...
Empowering faculty to embed security topics into computer science courses
ITiCSE '14: Proceedings of the 2014 conference on Innovation & technology in computer science educationSecurity illiteracy is a very common problem among Computer Science (CS) graduates entering the nation's digital workforce, which has contributed to a national cyber-infrastructure that could and should be more resilient to cyber-enemies than it is now. ...
Expanding security awareness in introductory computer science courses
InfoSecCD '09: 2009 Information Security Curriculum Development ConferenceInformation Security is typically reserved for upper division courses in Computer Science (CS) and Computer Information System (IS) programs. It is often an elective or graduate level course. Information Security is an important topic that can be ...
Comments